Pseudo-random numbers. The exact distribution of pairs
نویسندگان
چکیده
منابع مشابه
Pseudo - Random Numbers : Out of Uniform
Pseudo-random numbers – both uniform and non-uniform – are used in random sampling, simulation, and Monte-Carlo estimation. Base SAS software contains numerous random number, quantile, and probability functions allowing the user to generate a selection of nominal, discrete, and continuous random variates. Other variates may be generated with a data step, often making use of SAS functions. We wi...
متن کاملOn the Distribution of Pseudo -Random Numbers Generated by the Linear Congruential Method. II
The discrepancy of a sequence of pseudo-random numbers generated by the linear congruential method is estimated for parts of the period which are somewhat larger than the square root of the modulus. Applications to numerical integration are mentioned.
متن کاملOn the Distribution of Pseudo-Random Numbers Generated by the Linear Congruential Method
The discrepancy of sequences of pseudo-random numbers generated by the linear congruential method is estimated, thereby improving a result of Jagerman. Applications to numerical integration are mentioned. Let m be a modulus with primitive root X, and let y0 be an integer in the least residue system modulo m with g.c.d.(y0, m) = 1. We generate a sequence y0, yu of integers in the least residue s...
متن کاملOn the Distribution of Pseudo-Random Numbers Generated by the Linear Congruential Method. Ill
The discrepancy of a sequence of pseudo-random numbers generated by the linear congruential method, both homogeneous and inhomogeneous, is estimated for parts of the period that are somewhat larger than the square root of the modulus. The analogous problem for an arbitrary linear congruential generator modulo a prime is also considered, the result being particularly interesting for maximal peri...
متن کاملSteganography using Cryptography and Pseudo Random Numbers
When it comes to information hiding it is always a question whether to use Steganography or cryptography. Cryptography scrambles the message so that is it unrecognizable and without proper key the Encrypted message is useless. With the help of steganography messages can be passed over the network discreetly as it provides secure data hiding. It is very challenging and emerging field of research...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics of Computation
سال: 1971
ISSN: 0025-5718
DOI: 10.1090/s0025-5718-1971-0298727-8